Theft and loss happen. Make sure you’re protected.
When you lose a device, it’s not just the device itself that gets lost — it’s all the data on that device, too. For many companies, that can mean critical information. Protect your organization’s device and data through the power of automation with geofencing.
There are a number of additional benefits associated with geofencing dedicated devices beyond just security.
Discourage theft: Devices that are unusable outside of a specific area makes the likelihood of a device “disappearing” drop dramatically. And if a device does get stolen, you can rest easy knowing it’s unusable.
Prevent misuse: When you can track, monitor, and lock devices automatically, you know they’re being used as intended.
Locate lost devices: Sometimes, devices don’t get stolen — they legitimately get misplaced. If they happen to get misplaced on the back of a truck, for example, at least you’ll know that all your data is safe when it leaves the geofenced area.
Monitor device movement: Not all dedicated devices are stationary — think about in-cab logistics tablets, for example. With geofencing, you can set a large perimeter and get a notification if the device leaves that area. This helps verify devices (and vehicles, where necessary) are used for business purposes.
Process and routing optimization: Similarly, you can use geofencing to optimize delivery routes and processes. Maybe there’s a faster route just outside your geofenced area, but delivery drivers can’t go that way because their devices stop working. By monitoring geofenced areas, you can pinpoint these areas of inefficiency.
Geofencing might sound complicated, but Esper makes it easy. In fact, you can have your geofence ready to roll in just three simple steps: create, assign, and define.
The first step is creating your geofenced area. You choose where it starts, where it ends, and how big it is. We use Google Maps to help you pinpoint the exact location with the highest accuracy. Once you’ve created a geofenced area, you can assign devices to that geofenced area. And finally, you’ll define what happens when a device leaves the geofenced area. An alarm? Device lockdown? Both? Your call.
And that’s all there is to it. It’s fast, simple, and powerful — you’ll have all your devices fenced and protected within minutes. Bam.
Geofencing might sound complicated, but Esper makes it easy. In fact, you can have your geofence ready to roll in just three simple steps: create, assign, and define.
The first step is creating your geofenced area. You choose where it starts, where it ends, and how big it is. We use Google Maps to help you pinpoint the exact location with the highest accuracy. Once you’ve created a geofenced area, you can assign devices to that geofenced area. And finally, you’ll define what happens when a device leaves the geofenced area. An alarm? Device lockdown? Both? Your call.
And that’s all there is to it. It’s fast, simple, and powerful — you’ll have all your devices fenced and protected within minutes. Bam.
Geofencing creates a digitally fenced area that triggers an action when a device enters or leaves that area.
A common example of geofencing is location-based marketing in smartphone apps. When you get within the vicinity of a store, the app may generate a notification telling you about local deals or encourage you to use their store assistance mode. In this scenario, the geofenced area triggers when you enter it. In others, the geofence triggers when the device leaves it.
Yes. This isn’t a native function of any operating system (mobile or otherwise) and requires third-party software.
App pinning needs to be enabled in Settings. After that, you can swipe up to show recent apps, long press on the app, and select Pin. For more information, check out our full guide on how to use app pinning.
Geofencing is as accurate as the GPS on the device. This will vary by location — very dense areas (with trees or buildings, for example) will be less accurate than open areas.
Yes! It isn’t a native function, but you can enable geofencing with third-party software.